 All right. Hello, everyone. My name is John Hammond, and I wanted to continue a last video that I uploaded on the local capture flag competition that I put together for my schools like Cyber team is practice and as an exercise learn a little bit more about the simple CTF skills and stuff So base base was the name of the next challenge that I put together and it's really simple It was a picture of Shiba Inu Doge and the prompt being he's so cute. Maybe he has something to say and This actually isn't a secondography challenge But I guess to suppose a little bit of it and that you have to like look at the metadata the hint here Is it have you ever heard of X if tool because I use that or at least I recommend using that to look at the metadata of the File and that was again It's something that some of the newcomers either don't know or have never seen before So I wanted to showcase that to them and and let them know that that chat that that tool Exists so for demonstration purposes. We can totally get the flag. I had just downloaded that image and saved it and You would end up running exit tool on Simply the file and it gets all the information for you and the comment is a special thing to notice because that is in base 64 you can see that right here so Super simple super easy. It would just make sense for us to Base 64 decode that so I will go ahead and echo that Into base 64 dash D to run that in the command line and we get our flag Again insanely easy. You would see J the best base is the base 64 So go ahead and enter that as a flag and get our 75 points nice So the way that I ended up cooking that was that I again, I'll open sublime text To show you this code And what I ended up doing was I downloaded The file just a picture of Shiba Inu off the internet So this URL is something that I just found by like literally Google image searching like doge and This should be in your dog So it saves it as the file name and then it goes ahead and it takes the flag variable Base 64 encodes it. I actually had used for iron range for another challenge So this code is actually duplicate for a later challenge where I encoded the flag multiple times that have to keep base 64 Decoding in base 64 decoding, but since this only iterates one time You really don't even need this and that could actually just move to the very front This doesn't need to be inside of a loop But that's how I ended up writing it at the time and then I actually just call exit tool to write the comment to be the new base 64 encoded flag and I call this with sub process the module in Python 2 like call invoke other programs and I have to split it because as a shell it needs to have those arguments in the proper order so Again pretty simple thing. I just steal this image off the internet and Then slap the metadata of the comment to be a base 64 encoded version of the flag super easy So our simple one-liner get flag goes to scrape out the comment section grabs the value and then it base 64's It's output just like we did essentially in in in our terminal demonstration So not a hard challenge by any means but again wanted to showcase the exit tool for newcomers that haven't seen it before So that was how simple that previous challenge was but it got us on the board and stuff Okay, thanks for watching guys. I hope you're enjoying some of this You get to see for one thing a challenge and a solution and the creation of that challenge So please let me know if you want to see more of stuff like this Or I should get into more in-depth stuff because I definitely plan to right now This is just the beginner level stuff for the newcomers on the team. So thanks again. See you soon